A security vulnerability in the Linux kernel could allow external attackers to escalate privileges and execute malicious code.
Attackers could exploit a vulnerability known as the Stack Clash bug to gain full root privileges, according to researchers at security firm Qualys.
Actors have exploited a patched flaw to push a cryptocurrency miner to vulnerable Linux machines. The attacks take advantage of a vulnerability in Samba.
Two new linux Trojan strains have been discovered: One attempts to mine cryptocurrency, while the other cloaks the threat actor's identity.
A recent Linux update patched a vulnerability that enabled fraudsters to use heap spraying methods to execute arbitrary code and escalate permissions.
A security researcher recently discovered how zero-day exploits could be leveraged to steal private information from desktop Linux systems.
Researchers at the University of California, Riverside discovered a TCP flaw that has resided in the Linux implementation since 2012.
Is the new glibc getaddrinfo vulnerability really GHOST 2.0? Signs point to yes, so organizations should patch this vulnerability immediately.
The newly discovered KeRanger ransomware can be used in attacks on Mac OS X thanks to its Linux source code, undermining many perceptions about the OS.
The GNU C Library (glibc) is vulnerable to a stack-based buffer overflow issue. Learn more about the problem and how to avoid, patch and mitigate it.